7. So to built a trusted infrastructure to protect the content is being difficult.
8. The computer community revisit the current approaches.3 Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh
9. Early Technology Encrypted with K1 Content Purchaser 1 Having k1 Content Rights Encrypted with K2 Content Purchaser 2 Having k2 Content Content provider Rights Encrypted with K3 Content Content Purchaser 3 Having k3 Rights 4 Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh
10. Second Generation DRM Encrypted with K1 Encrypted with K Content Purchaser 1 Having k1 Rights Content K Encrypted with K Content Encrypted with K2 Content Purchaser 2 Having k2 Rights Content provider K Encrypted with K3 Rights Content Purchaser 3 Having k3 K 5 Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh
11. Current Architecture Financial Clearinghouse Content Provider End user web server Rights Clearinghouse 6 Qudrat-E-Alahy Ratul, Kuet, Khulna, Bangladesh